Shop

(solved)List and briefly define three classes of intruders.What are two common techniques used to protect a password file and what are three benefits that can be provided by an intrusion detection system?

$9.99

Kindly ADD to CART and Purchase the FULL Answer at $9.9 only.

Category:
Description
n

please answer below questions in one line each. No copying from internet

nnnn

1. List and briefly define three classes of intruders.

nnnn

2. What are two common techniques used to protect a password file?

nnnn

3. What are three benefits that can be provided by an intrusion detection system?

nnnn

4. What is the difference between statistical anomaly detection and rule-based intrusion detection?

nnnn

5. What metrics are useful for profile-based intrusion detection?

nnnn

6. What is the difference between rule-based anomaly detection and rule-based penetration identification?

nnnn

7. What is a honeypot?

nnnn

8. What is a salt in the context of UNIX password management?

nnnn

9. List and briefly define four techniques used to avoid guessable passwords.

nnnn

10. List three design goals for a firewall.

nnnn

11. List four techniques used by firewalls to control access and enforce a security policy.

nnnn

12. What information is used by a typical packet filtering firewall?

nnnn

13. What are some weaknesses of a packet filtering firewall?

nnnn

14. What is the difference between a packet filtering firewall and a stateful inspection firewall?

nnnn

15. What is an application-level gateway?

nnnn

16. What is a circuit-level gateway?

nnnn

17. What are the common characteristics of a bastion host?

nnnn

18. Why is it useful to have host-based firewalls?

nnnn

19. What is a DMZ network and what types of systems would you expect to find on such networks?

nnnn

20. What is the difference between an internal and an external firewall?

nnn